计算机安全 Jobs

Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.

Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.

There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.

I need a science paper on the design of a High Speed Distributed Virtual Private Network (Node based), functioning on IKEv2/IPsec. This network needs to focus on Security (Encryption/User and Node authentication), Speed (bandwidth and throughput), Auto-reconnect, Stability, and Reliability, as well as Compatibility with most Operating Systems (Win/Linux/Android/iOS) on PC/Laptop/Tablet/Mobile Devi...

We need to use several computers in many regions remotely and this lasts for many years.
It needs high internet speed and computer performance.
And you must be male who lives in Europe or NorthAmerica.

Hello. We are a digital marketing agency looking to outsource and hire a part time freelancer with the credentials of a cyber security manager. We work with multiple tools and servers including our main which is our application. Please message me for further details. Thank you.
PS: Please note this is a part time, fixed monthly salary job posting.

Steps:
1. Analyse the network and create a security policy based on the best practices (Defence in Depth and The Principle of
Segregation) for the network infrastructure. In order to achieve this the students need to execute step 2 (covers LO 3.1).
2. Identify the devices which may be secured, the services which are provided by them, their criticality in the network, their
vulnerabilities and poss...

I have a local network program : client program and server program , the client program need some updating but the coder is not available , so we want to develop the client program ourselves , when we used wireshark program to know the communication way between the client and server program , we saw the login data we entered seems to be encrypted as attached , the login user was: 65479
and the p...

One of our customers is undertaking a project to install Packetfence as a NAC solution in their network. We are looking for someone who is expert in Packetfence to do this project. The customer is in Saudi Arabia, Riyadh, and the work has to be onsite.
Customer has around 200-300 servers, and more workstations.

The year 2020 was predicted to be the most effective year for IoT revolution. , we are already witnessing
the presence of IoT devices and the increment in their uses for many practical problems. The rapidly
increasing number of attacks is posing a huge problem for the IoT community. The IoT devices are
deemed attractive by the attackers and vice-versa. They have limited power and memory and comput...

We are a start-up company with 4 developers and planning to expand the team to 10. We need suggestions & Methods to Protect our Source Code from theft (new employees copying them to their mails etc )
Work Environment
We provide laptops to work & internet is enabled in all the laptops.
Employees carry Laptop with them & Do work from Home

Create a presentation to propose a solution for a company to improve security around their network, this includes securing their data at transit and at rest, supporting relevant pci compliance, protecting their users/devices/systems from attacks and enables meaningful reporting on user/network activity.
The solution will cover products in network security, cloud, LAN, WAN, and voice.

Field support engineers and technicians give on-the-scene support for network connections and for police work flaws associated with hardware, networking, software, configuration, and inconsistent power provide. The engineers and technicians should support the installation tasks, together with testing, documentation, and setup. Field support specialists additionally participate in conferences and a...

Field support engineers and technicians give on-the-scene support for network connections and for police work flaws associated with hardware, networking, software, configuration, and inconsistent power provide. The engineers and technicians should support the installation tasks, together with testing, documentation, and setup. Field support specialists additionally participate in conferences and a...

Dear User:
First of all I would like to know our experience or study or something that garantee me our profesional work...
Show me by examples how easy is taking the control of the Android Device with the last techniques of hacking...
How to found cero days mistakes of apps to keep control of other devices also with antiviruses...
Then how to stay update to avoid new techniques against me abou...

Dear User:
First of all I would like to know our experience or study or something that garantee me our profesional work...
Show me by examples how easy is taking the control of the Android Device with the last techniques of hacking...
How to found cero days mistakes of apps to keep control of other devices also with antiviruses...
Then how to stay update to avoid new techniques against me abou...

This job description will be discussed with potential applicants only after strict vetting and background checks have been completed. Previous experience in [登录来查看链接] intelligence, counter/surveillance, encryption/decryption, anti denial of service protection protocols etc. Are highly recommended

I am looking for someone can help me to find hackers who can do white and black hat jobs.
We need minimum three hackers to do a great number of jobs.
Your payment can be negotiated. But suggested way would be on project basis as we have a great number of project going on here. Alternatively we can pay you a one off introducing fee once the first project is completed.

Hello, I am in need of an expert programmer who is skilled in java, C and Python. As well as this I need the programmer to have excellent report writing skills. I need the following over the course of the next 1/2 Months:
A fully Created Application (With Unit Testing).
A fully Completed Research Paper (Minimum 20,000 words & 30 Harvard style References, these have to be authentic for example...